Spread Firefox Affiliate Button

The Einstein Robot Smiles

Check out this Einstein robot which is able to teach itself how to smile or display other emotions. According to the researchers, who presented the project last month at the 2009 IEEE 8th International Conference on Development and Learning, this is the first time anyone has used machine learning to teach a robot to make realistic facial expressions.





If robot can smile, why don't you wear yours today.. :)

Posted on 8/06/2009 01:13:00 AM by ket@n and filed under | 0 Comments »

Hack Passwords Using USB Drive!

Today I will show you how to hack Passwords using an USB Pen Drive.
As we all know, Windows stores most of the passwords which are used on a daily basis, including instant messenger passwords such as MSN, Yahoo, AOL, Windows messenger etc.
Along with these, Windows also stores passwords of Outlook Express, SMTP, POP, FTP accounts and auto-complete passwords of many browsers like IE and Firefox, chrome etc. There exists many tools for recovering these passswords from their stored places. Using these tools and an USB pendrive you can create your own rootkit to hack passwords from your friend’s/college Computer.

We need the following tools to create our rootkit:

==================


MessenPass:

Recovers the passwords of most popular Instant Messenger programs: MSN Messenger, Windows Messenger, Yahoo Messenger, ICQ Lite 4.x/2003, AOL Instant Messenger provided with Netscape 7, Trillian, Miranda, and GAIM.

Mail PassView:

Recovers the passwords of the following email programs: Outlook Express, Microsoft Outlook 2000 (POP3 and SMTP Accounts only), Microsoft Outlook 2002/2003 (POP3, IMAP, HTTP and SMTP Accounts), IncrediMail, Eudora, Netscape Mail, Mozilla Thunderbird, Group Mail Free.
Mail PassView can also recover the passwords of Web-based email accounts (HotMail, Yahoo!, Gmail), if you use the associated programs of these accounts.

Posted on 7/22/2009 08:18:00 PM by ket@n and filed under | 0 Comments »

School life Vs College life

School life Vs College life


School: 1 colored dress for 100s of days
College: 100 colored dresses for 1 day

School: 2 note books for 1 subject
College: 1 notebook for all subjects

School: white pipe in teacher's hand (chalk)
Coll: white pipe in student's hand (cigarette)

School: Most frequent letter-Leave letter
College: Most frequent letter - Love letter

School: if we go itz boring
college :if we dont go its boring

SO ENJOY...........
Posted on 7/17/2009 11:05:00 PM by m@yur and filed under | 0 Comments »

Hack this Website

www.smsintegra.com

This website is used to send sms through internet.I will tell you how to hack any paid user of this site.


^change the red part with any username.. u want to find the pass, eg. - mohit ,raj, etc....



  • One page will open to change password (don't change the password) just right click then click on View source.

  • Then press "Ctrl+f " or simply find
    ID="password" value="
    continued..
Posted on 7/11/2009 07:38:00 PM by ket@n and filed under , , | 1 Comments »

firefox features n short tricks

Everybody’s favorite open-source browser, Firefox, is great right out of the box. And by adding some of the awesome extensions available out there, the browser just gets better and better.

But look under the hood, and there are a bunch of hidden (and some not-so-secret) tips and tricks available that will crank Firefox up and pimp your browser. Make it faster, cooler, more efficient. Get to be a Jedi master with the following cool Firefox tricks.

1) More screen space. Make your icons small. Go to View - Toolbars - Customize and check the “Use small icons” box.

2) Smart keywords. If there’s a search you use a lot (let’s say IMDB.com’s people search), this is an awesome tool that not many people use. Right-click on the search box, select “Add a Keyword for this search”, give the keyword a name and an easy-to-type and easy-to-remember shortcut name (let’s say “actor”) and save it. Now, when you want to do an actor search, go to Firefox’s address bar, type “actor” and the name of the actor and press return. Instant search! You can do this with any search box.....
Posted on 7/02/2009 08:27:00 PM by m@yur and filed under | 0 Comments »

What are Trojans?

What is a trojan?
A trojan horse could be either:
a) Unauthorized instructions contained within a legitimate program. These instrcutions perform functions unknown to (and probably unwanted by) the user.
b) A Useful program that has been altered by the placement of unauthorized instructions within it.
These instructions perform functions unknown to (and probably unwanted by) the user.
c) Any program that appears to perform a desirable and necessary function but that (because of
unauthorized instructions within it) performs functions unknown to (and probably unwanted by) the user.

Under a restricted environment (a restricted Unix shell or a restricted Windows computer), malicious trojans can't do much, since they are restricted in their actions. But on a home PC, trojans can be lethal and quite destructive.
Posted on 6/18/2009 12:26:00 AM by ket@n and filed under , | 0 Comments »

♫► SAY NO TO PIRACY GET THESE FREE SOFTWARES◄♫

I am sure at some stage we all are guilty of using Pirated Software. There has been so much reported and discussed about this in recent years that it has got me thinking — Do We Really Need Pirated Software?
The conclusion I have come to is NO!
Let us first of all examine briefly what Piracy is all about?
I found this on Autodesk site and it sums up the matter quite excellently in the first 4 points, which are reproduced below:

1. What is software “piracy”?
Software “piracy” is the unauthorized possession and/or use of software. It is a crime no different from shoplifting software from store shelves. Purchasers of software do not actually own the software. What they own is the right to use the software according to the terms of the publisher’s license. Purchasers agree to abide by the terms of the license, which typically limits copying privileges to a single copy for backup purposes.
All legal software is supplied with a license. This applies whether the software is acquired for use on one machine, for networking across a number of machines, or if it is pre-installed as part of a system. The license is designed to protect the rights of software developers and is enforced by copyright laws.
Piracy may take many forms, including:
* unauthorized copying of software programs purchased legitimately, also known as “end-user” piracy. This can occur when the number of PCs installed with the software exceeds the licenses that an individual or company has purchased;
* gaining illegal access to protected software, also knwn as “cracking”; nd
* reproducing and/or distributing counterfeit or unauthorized software, often over the counter, or sold, bartered, or shared by individuals on the Internet; and software programs pre-installed by vendors who sell computers without providing the accompanying software license.

2. What is the difference between criminal and civil software piracy?
The majority of software piracy is....
Posted on 6/14/2009 07:02:00 PM by ket@n and filed under | 0 Comments »